Latest Apache HTTP Server vulnerability #
The Apache Software Foundation recently announced a path traversal vulnerability present in version 2.4.49 of the Apache HTTP Server software. Due to insufficient coverage of potential path traversal characters in the URL, an unauthenticated attacker can read files outside of the document root and even execute system commands in some configurations. While this vulnerability (CVE-2021-41773) only affects version 2.4.49 (and 2.4.50 as a variant), it was exploited in the wild to Apache publishing their security advisory.
Update: The 2.4.50 fix was incomplete and we strongly recommend upgrading to 2.4.51 or newer.
How to find potentially vulnerable Apache HTTP Servers #
From the Service Inventory, use the following pre-built query to locate vulnerable Apache HTTP Server instances in your network:
product:"apache httpd" AND protocol:http AND (http.head.server:"Apache/2.4.49" OR http.head.server:"Apache/2.4.50")
As always, any prebuilt queries we create are available from our Queries Library. Check out the library for other useful inventory queries.
Try runZero #
Don't have runZero and need help finding your Apache HTTP Server instances? Start your trial today.